Brussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security

Similar documents
Cyber Resilience. Think18. Felicity March IBM Corporation

Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe

Cyber Resiliency. Felicity March. May 2018

Business continuity management and cyber resiliency

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity

Top Five Ways to Protect Your Organization from Data Loss & Cyber Hackers

Implementing BCM Frameworks. Monday 19 November Aidan O Brien Head of Resilience and Security National Australia Group Europe

TSC Business Continuity & Disaster Recovery Session

Recovery at a Click - where to be in 18 months

ON CALL, ALL THE TIME DISASTER RECOVERY AS A SERVICE FROM WINDSTREAM

Cyber fraud and its impact on the NHS: How organisations can manage the risk

Disaster Recovery Is A Business Strategy

Cybersecurity and the Board of Directors

The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats

Bonnie A. Goins Adjunct Industry Professor Illinois Institute of Technology

Ensuring business continuity with comprehensive and cost-effective disaster recovery service.

Cybersecurity for Health Care Providers

Building a Resilient Security Posture for Effective Breach Prevention

Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES

DIGITAL ACCOUNTANCY FORUM CYBER SESSION. Sheila Pancholi Partner, Technology Risk Assurance

Data Protection in Practice

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

2015 VORMETRIC INSIDER THREAT REPORT

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

PA TechCon. Cyber Wargaming: You ve been breached: Now what? April 26, 2016

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

Protecting your next investment: The importance of cybersecurity due diligence

Keynote Speech Keys to Resilience for SMEs

Cyber Resiliency: A Recipe for Digital Trust?

Business Continuity Management

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

MITIGATE CYBER ATTACK RISK

Understanding the Changing Cybersecurity Problem

Strategy is Key: How to Successfully Defend and Protect. Session # CS1, February 19, 2017 Karl West, CISO, Intermountain Healthcare

Copyright 2016 EMC Corporation. All rights reserved.

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Incident Response. Tony Drewitt Head of Consultancy IT Governance Ltd

Sage Data Security Services Directory

Rejuvenating BCM - Infrastructure. Business Continuity Awareness Week March 2009

0x70 Eric Bärenzung. Cyber risks. in the satellite industry

RSA Advanced Cyber Defence Summit

Security by Default: Enabling Transformation Through Cyber Resilience

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

Express Monitoring 2019

mhealth SECURITY: STATS AND SOLUTIONS

Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise

Cyber Risk and Third Party Risk Management. Lisa Murphy First Horizon National Corporation

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Building Resilience in a Digital Enterprise

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

GDPR COMPLIANCE REPORT

Reinvent Your 2013 Security Management Strategy

Conducted by Vanson Bourne Research

Dell EMC Isolated Recovery

Combating Cyberattacks Through Network Agility and Automation Sagi Chief Technology Officer

Jeff Wilbur VP Marketing Iconix

Background FAST FACTS

Repairing the Broken State of Data Protection

2015 HFMA What Healthcare Can Learn from the Banking Industry

Bradford J. Willke. 19 September 2007

Business Continuity Planning Keeping Pace with New Technology

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

The NIS Directive and Cybersecurity in

Business Resiliency Strategies for the Cloud. Summary Results September 2017

Cybersecurity Survey Results

Combating Cyber Risk in the Supply Chain

Security and Compliance for Office 365

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide

The Cyber War on Small Business

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Policy Session 4 Identifying Risk: An abundance of Potential Shock Waves

CAGFO Conference September 2018

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

IBM Resiliency Services:

Security in India: Enabling a New Connected Era

Why you should adopt the NIST Cybersecurity Framework

Cybersecurity and Nonprofit

Are You Protected. Get Ahead of the Curve

Background FAST FACTS

Must Have Items for Your Cybersecurity or IT Budget in 2018

What Does the Future Look Like for Business Continuity Professionals?

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

GDPR: The Day After. Pierre-Luc REFALO

RISING CYBER SECURITY CAPABILITY WITH A UNIQUE NETWORK OF TRUSTED PARTNERS. Jan De Blauwe Chairman Cyber Security Coalition Belgium

INFRASTRUCTURE. A Smart Strategy Global Water Asset Management Lead, Ove Arup NYC FORUM -

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness

Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

Business Continuity Risk Management IT Service Continuity

2018 Edition. Security and Compliance for Office 365

ISACA West Florida Chapter - Cybersecurity Event

Transcription:

Cyber Resiliency Minimizing the impact of breaches on business continuity Jean-Michel Lamby Associate Partner - IBM Security Brussels Think Brussels / Cyber Resiliency / Oct 4, 2018 / 2018 IBM Corporation

Global Risks that have a macro- impact across sectors. Boards across the globe need to consider how key business parameters will be influenced by these risks in view of mitigations implemented. In terms of Cyberattacks, preparedness presents a significant opportunity to derisk the business. However a coherent strategy and understanding of underlying issues is lacking, as the impact is not fully understood at the Board Level. Business Impact 4.8-15% * Stock Value Erosion post Cyberattack / Data Breach Source: World Economic Forum, Davos 2018 Source: Cyber Value Connection

Cyber Resilience Market Summary Top 5 Threats of 2018 1 : 1. Cyber attack 2. Data breach 3. Unplanned IT outage 4. Interruptions to utility supply 5. Adverse weather 1 BCI Horizon Scan Report 2018 Business impact of cyber attacks and data breaches is very high $3.86 million average cost of a data breach 1 $350.44 million average cost of a mega data breach 2 Damaged brand reputation, loss of trust 1,2 Ponemon Institute 2018 Cost of Data Breach Study Cyber Risk is a C-Suite Priority: New worry for CEO, CIO and CISO: A career-ending cyberattack Mitigating cyber risks is now a top boardroom agenda 1 1 KPMG CEO Outlook 2017 Analysts predict increased attacks and higher security and DR spending 27.9% average probability of material breach in the next 24 months 1 $96 billion security spending in 2018 2 $12.5 billion DRaaS market by 2022 3 1 Ponemon Institute 2018 Cost of Data Breach Study 2 Gartner 3 Markets and Markets

Most companies already have taken ample measures to protect themselves from the most common cyber disruptors. Top 5 causes of cyber disruptions 61% Phishing and social engineering 45% Malware 37% Spear-phishing attack 24% Denial of service 21% Out-of-date software

The cost of cyber attacks is more than 3x the cost of natural disasters. In addition, cyber attacks occur everywhere, also in areas that are generally safe from natural disasters. Organisations are unprepared 68% 66% 69 days 197 days Lack the ability to remain resilient in the wake of a cyber attack Suffer from insufficient planning and preparedness Average amount of time organisation need to contain a cyber attack. Average amount of time hackers spend inside IT environments before discovery

Double hit Cyber Resilience Specifics Re-occurence Two fights What else? RPO? RTO? MARC?

New Cyber Resilience Combined Capabilities

IBM Strategy: Cyber Resiliency Framework Identify Identify your risks and Cyber Resiliency Maturity level Protect by discovering vulnerabilities before they are exploited Recover Protect Detect unknown threats with advanced analytics Respond with a Plan to cyber outbreaks Respond Detect Recover access to critical data and applications Cyber Resiliency lifecycle based on the industry standard NIST Cybersecurity framework

IBM Cyber Resiliency Assessment We can also help you take a step back and make an assessment of your current readiness and to define a practical, actionable and roadmap to support your improvement objectives.

Cyber incident recovery for platform enables fast restoration of services by replicating a golden copy of server and device configuration data to air-gap protected immutable storage.

Cyber incident recovery for data enables fast recovery against cyberattacks by protecting data through the use of air-gapped and immutable storage while orchestrating fast recovery at the DR site.

Orchestration / Automation Complete DR lifecycle automation Software Defined Resiliency Intelligent Workflow Single Dashboard Hybrid environment Data Centres Private Cloud Public Cloud IoT The Cyber Security Breaches Survey 2018, published by the UK Government, found that while most organizations see cyber security as a high priority, only 20 % of staff members had any formal training to deal with a cyber attack. Hybrid environment, comprising several locations that all may be impacted simultaneously by a cyber attack, necessitates an orchestrated recovery of all locations at once. This in contrast with traditional disaster recovery where disasters tend to be well contained in one location.

Thank you Jean-Michel Lamby Associate Partner Jean-Michel.Lamby@be.ibm.com +32 471 35 21 34 ibm.com Think Brussels /Cyber Resiliency / Oct 4, 2018 / 2018 IBM Corporation 13

Think CityName / DOC ID / Month XX, 2018 / 2018 IBM Corporation 14